


Остановите войну!
for scientists:


default search action
Computer Networks, Volume 50
Volume 50, Number 1, January 2006
- Christos Nomikos, Aris Pagourtzis
, Katerina Potika
, Stathis Zachos:
Routing and wavelength assignment in multifiber WDM networks with non-uniform fiber cost. 1-14 - Yuming Jiang:
Delay bound and packet scale rate guarantee for some expedited forwarding networks. 15-28 - Thijs Lambrecht, Bart Duysburgh, Tim Wauters, Filip De Turck, Bart Dhoedt, Piet Demeester:
Optimizing multimedia transcoding multicast trees. 29-45 - Kun-Chan Lan, John S. Heidemann:
A measurement study of correlations of Internet flow characteristics. 46-62 - Daniele Miorandi, Arzad Alam Kherani, Eitan Altman:
A queueing model for HTTP traffic over IEEE 802.11 WLANs. 63-79 - Jun-Hong Cui, Li Lao, Michalis Faloutsos
, Mario Gerla:
AQoSM: Scalable QoS multicast provisioning in Diff-Serv networks. 80-105 - An-Hsun Cheng, Yuh-Jzer Joung
:
Probabilistic file indexing and searching in unstructured peer-to-peer networks. 106-127 - Novella Bartolini
, Emiliano Casalicchio:
A performance analysis of context transfer protocols for QoS enabled internet services. 128-144
Volume 50, Number 2, February 2006
- Harry G. Perros:
Optical networks. 145-148 - Li-Wei Chen, Poompat Saengudomlert, Eytan H. Modiano:
Uniform versus non-uniform band switching in WDM networks. 149-167 - Anwar Haque, Pin-Han Ho, Raouf Boutaba:
Group shared protection for spare capacity reconfiguration in optical networks. 168-180 - Michael T. Frederick, Pallab Datta, Arun K. Somani:
Sub-graph routing: A generalized fault-tolerant strategy for link failures in WDM optical networks. 181-199 - Narendra K. Singhal, Canhui Ou, Biswanath Mukherjee:
Cross-sharing vs. self-sharing trees for protecting multicast sessions in mesh networks. 200-206 - Achille Pattavina:
Performance of deflection routing algorithms in IP optical transport networks. 207-218 - Tzvetelina Battestilli
, Harry G. Perros:
A performance study of an optical burst switched network with dynamic simultaneous link possession. 219-236 - Nizar Bouabdallah, André-Luc Beylot, Guy Pujolle:
Efficient bandwidth sharing and fair access in single-hub WDM rings. 237-250 - Eva Marín-Tordera, Xavier Masip-Bruin
, Sergio Sánchez-López, Josep Solé-Pareta
, Jordi Domingo-Pascual:
A hierarchical routing approach for optical transport networks. 251-267 - Lorne Mason, Anton Vinokurov, Ning Zhao, David V. Plant:
Topological design and dimensioning of Agile All-Photonic Networks. 268-287
Volume 50, Number 3, February 2006
- Sun-Myeng Kim
, Young-Jong Cho:
A distributed collision resolution scheme for improving the performance in wireless LANs. 289-300 - Qin Zheng, Gurusamy Mohan
:
Multi-layer protection in IP-over-WDM networks with and with no backup lightpath sharing. 301-316 - Randeep Bhatia, Murali S. Kodialam, T. V. Lakshman:
Fast network re-optimization schemes for MPLS and optical networks. 317-331 - Leopoldo Angrisani, Salvatore D'Antonio, Marcello Esposito, Michele Vadursi
:
Techniques for available bandwidth measurement in IP networks: A performance comparison. 332-349 - Yongqing Zhu, Maode Ma, Tee Hiang Cheng:
Hierarchical scheduling to support differentiated services in Ethernet passive optical networks. 350-366 - Dario Di Sorte, Mauro Femminella, Leonardo Piacentini, Gianluca Reali:
Performance evaluation of the push-mode-multicast based candidate access router discovery (PMM CARD). 367-397 - Dan Pei
, Beichuan Zhang, Daniel Massey, Lixia Zhang:
An analysis of convergence delay in path vector routing protocols. 398-421 - Kartikeya Chandrayana, Sthanunathan Ramakrishnan, Biplab Sikdar
, Shivkumar Kalyanaraman:
On randomizing the sending times in TCP and other window based algorithms. 422-447 - Nicolas Bonmariage, Guy Leduc:
A survey of optimal network congestion control for unicast and multicast transmission. 448-468
Volume 50, Number 4, March 2006
- Raouf Boutaba, Alan Marshall:
Management in peer-to-peer systems: Trust, reputation and security. 469-471 - Sergio Marti, Hector Garcia-Molina:
Taxonomy of trust: Categorizing P2P reputation systems. 472-484 - Zoran Despotovic, Karl Aberer:
P2P reputation management: Probabilistic estimation vs. social networks. 485-500 - Minaxi Gupta, Mostafa H. Ammar, Mustaque Ahamad:
Trade-offs between reliability and overheads in peer-to-peer reputation tracking. 501-522 - Rob Sherwood, Seungjoon Lee, Bobby Bhattacharjee:
Cooperative peer groups in NICE. 523-544 - Loubna Mekouar
, Youssef Iraqi
, Raouf Boutaba:
Peer-to-peer's most wanted: Malicious peers. 545-562 - Thanasis G. Papaioannou
, George D. Stamoulis:
Reputation-based policies that provide the right incentives in peer-to-peer environments. 563-578 - Vivek Pathak, Liviu Iftode:
Byzantine fault tolerant public key authentication in peer-to-peer systems. 579-596
Volume 50, Number 5, 6 April 2006
- Ian F. Akyildiz, Harry Rudin:
Editorial. 597-598 - Levente Tamási, Dániel Orincsay, Balázs Gábor Józsa:
Cost-optimal design of VoIP networks using the VPN concept. 599-614 - Edith Cohen, Balachander Krishnamurthy:
A short walk in the Blogistan. 615-630 - Hans van den Berg, Michel Mandjes, Remco van de Meent, Aiko Pras, Frank Roijers, Pieter Venemans:
QoS-aware bandwidth provisioning for IP network links. 631-647 - Shudong Jin, Azer Bestavros
:
Small-world characteristics of Internet topologies and implications on multicast scaling. 648-666 - Weiying Zhu, Min Song:
Integration of unicast and multicast scheduling in input-queued packet switches. 667-687 - Fulvio Risso
, Mario Baldi:
NetPDL: An extensible XML-based language for packet header description. 688-706 - Bo Li, Roberto Battiti
, Akira Fukuda:
Performance analysis of a service-dependent handoff scheme in voice/data integrated cellular mobile systems. 707-730
Volume 50, Number 6, 13 April 2006
- Laurent Mathy, David Hutchison
, Thomas Plagemann, Peter Steenkiste:
Overlay distribution structures and their applications. 739-741 - Yong Zhu, Constantinos Dovrolis, Mostafa H. Ammar:
Dynamic overlay routing based on available bandwidth estimation: A simulation study. 742-762 - Ju Wang, Andrew A. Chien:
Understanding when location-hiding using overlay networks is feasible. 763-780 - Beichuan Zhang, Wenjie Wang, Sugih Jamin, Daniel Massey, Lixia Zhang:
Universal IP multicast delivery. 781-806 - Karthik Lakshminarayanan, Ananth Rao, Ion Stoica, Scott Shenker:
End-host controlled multicast routing. 807-825 - Suman Banerjee, Christopher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller:
OMNI: An efficient overlay multicast infrastructure for real-time applications. 826-841 - Jian Liang, Rakesh Kumar, Keith W. Ross:
The FastTrack overlay: A measurement study. 842-858 - Xiaotao Liu, Jiang Lan, Prashant J. Shenoy
, Krithi Ramamritham:
Consistency maintenance in dynamic peer-to-peer overlay networks. 859-876
Volume 50, Number 7, May 2006
- Vehbi C. Gungor, Frank C. Lambert:
A survey on communication networks for electric system automation. 877-897 - Maria Fazio
, Massimo Villari
, Antonio Puliafito:
IP address autoconfiguration in ad hoc networks: Design, implementation and measurements. 898-920 - Hongli Luo, Mei-Ling Shyu, Shu-Ching Chen:
An optimal resource utilization scheme with end-to-end congestion control for continuous media stream transmission. 921-937 - Erdal Cayirci, Vedat Coskun
, Caghan Cimen:
Querying sensor networks by using dynamic task sets. 938-952 - Rong-Hong Jan, Ching-Peng Lin, Maw-Sheng Chern:
An optimization model for Web content adaptation. 953-965 - Antonio Capone
, Luigi Fratta, Fabio Martignon:
Dynamic online QoS routing schemes: Performance and bounds. 966-981 - Eitan Altman, Dhiman Barman, Rachid El Azouzi
, David Ros, Bruno Tuffin:
Pricing differentiated services: A game-theoretic approach. 982-1002 - Xudong Wang:
A capacity acquisition protocol for channel reservation in CDMA networks. 1003-1021
Volume 50, Number 8, June 2006
- Giuseppe Bianchi
, Marco Listanti
, Michela Meo, Maurizio M. Munafò:
Selected papers from the 3rd international workshop on QoS in multiservice IP networks (QoS-IP 2005). 1023-1025 - Markus Fidler, Stephan Recker:
Conjugate network calculus: A dual approach applying the Legendre transform. 1026-1039 - Alexander Sayenko, Timo Hämäläinen
, Jyrki Joutsensalo, Lari Kannisto:
Comparison and analysis of the revenue-based adaptive queuing models. 1040-1058 - Juha Leino, Jorma T. Virtamo:
Insensitive load balancing in data networks. 1059-1068 - Raffaele Bolla
, Roberto Bruschi
, Franco Davoli
:
Capacity planning in IP Virtual Private Networks under mixed traffic. 1069-1085 - Emílio C. G. Wille
, Marco Mellia
, Emilio Leonardi
, Marco Ajmone Marsan:
Algorithms for IP network design with end-to-end QoS constraints. 1086-1103 - György Dán, Viktória Fodor, Gunnar Karlsson
:
On the effects of the packet size distribution on FEC performance. 1104-1129 - Manodha Gamage, Mitsuo Hayasaka, Tetsuya Miki:
A connection-oriented network architecture with guaranteed QoS for future real-time applications over the Internet. 1130-1144 - Cédric de Launois, Bruno Quoitin
, Olivier Bonaventure:
Leveraging network performance with IPv6 multihoming and multiple provider-dependent aggregatable prefixes. 1145-1157 - Liesbeth Peters, Ingrid Moerman
, Bart Dhoedt, Piet Demeester:
Q-MEHROM: Mobility support and resource reservations for mobile senders and receivers. 1158-1175 - Giovanni Neglia, Vincenzo Falletta, Giuseppe Bianchi
:
An analytical model of a new packet marking algorithm for TCP flows. 1176-1191
Volume 50, Number 9, June 2006
- Öznur Özkasap
, Mine Çaglar
:
Traffic characterization of transport level reliable multicasting: Comparison of epidemic and feedback controlled loss recovery. 1193-1218 - Dianxun Shuai, Xiang Feng:
The parallel optimization of network bandwidth allocation based on generalized particle model. 1219-1246 - Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Jiau, Wei-Te Hu:
Detection and diagnosis of data inconsistency failures in wireless sensor networks. 1247-1260 - Flavio De Angelis, Ibrahim W. Habib, Fabrizio Davide
, Mahmoud Naghshineh:
Increasing revenues via adaptive filtering in wired/wireless networks. 1261-1280 - Tian Bu, Samphel Norden, Thomas Y. C. Woo:
A survivable DoS-resistant overlay network. 1281-1301 - Jiwei Chen, Fernando Paganini, M. Y. Sanadidi, Ren Wang, Mario Gerla:
Fluid-flow analysis of TCP Westwood with RED. 1302-1326 - Stéphane Lafrance:
Using equivalence-checking to verify robustness to denial of service. 1327-1348 - Tamma Bheemarjuna Reddy
, S. Sriram, B. S. Manoj
, C. Siva Ram Murthy:
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks. 1349-1383 - Hailong Li, Malvin Wei Liak Tan, Ian Li-Jin Thng:
Fairness issue and monitor-based algorithm in optical burst switching networks. 1384-1405 - Fu-Yuan Lee, Shiuh-Pyng Shieh:
Packet classification using diagonal-based tuple space search. 1406-1423
Volume 50, Number 10, July 2006
- Mark Levene, Alexandra Poulovassilis:
Special issue on Web dynamics. 1425-1429 - Yiping Ke
, Lin Deng, Wilfred Ng, Dik Lun Lee
:
Web dynamics and their ramifications for the development of Web search engines. 1430-1447 - Judit Bar-Ilan
, Mazlita Mat-Hassan, Mark Levene:
Methods for comparing rankings of search engine results. 1448-1463 - Ricardo A. Baeza-Yates
, Barbara Poblete
:
Dynamics of the Chilean Web structure. 1464-1473 - Hua-Fu Li, Suh-Yin Lee, Man-Kwan Shan:
DSM-PLW: Single-pass mining of path traversal patterns over streaming Web click-sequences. 1474-1487 - Olfa Nasraoui, Carlos Rojas, Cesar Cardona:
A framework for mining evolving trends in Web data streams using dynamic learning and retrospective validation. 1488-1512 - George Papamarkos, Alexandra Poulovassilis, Peter T. Wood:
Event-condition-action rules on RDF metadata in P2P environments. 1513-1532 - Stefano Ceri, Florian Daniel
, Federico Michele Facca
:
Modeling web applications reacting to user behaviors. 1533-1546 - Anoop Sanka, Shravan Chamakura, Sharma Chakravarthy:
A dataflow approach to efficient change detection of HTML/XML documents in WebVigiL. 1547-1563 - Delfina Malandrino
, Vittorio Scarano
:
Tackling Web dynamics by programmable proxies. 1564-1580
- Roberto De Prisco
, Sergio Rajsbaum
:
Algorithmic problems in distributed systems. 1581-1582 - Qixiang Sun, Neil Daswani, Hector Garcia-Molina:
Maximizing remote work in flooding-based peer-to-peer systems. 1583-1598 - J. J. Garcia-Luna-Aceves, Marc Mosko
, Charles E. Perkins:
A new approach to on-demand loop-free routing in networks using sequence numbers. 1599-1615 - Ittai Abraham, Danny Dolev
:
Asynchronous resource discovery. 1616-1629 - Pierre Fraigniaud, Cyril Gavoille:
Header-size lower bounds for end-to-end communication in memoryless networks. 1630-1638 - Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. 1639-1652
Volume 50, Number 11, August 2006
- Hua Zhu, Imrich Chlamtac:
Admission control and bandwidth reservation in multi-hop ad hoc networks. 1653-1674 - Puneet Sharma, Jack Brassil, Sung-Ju Lee, Kang G. Shin:
Improving aggregated channel performance through decentralized channel monitoring. 1675-1691 - Tippyarat Tansupasiri, Kanchana Kanchanasut, Chadi Barakat
, Philippe Jacquet:
Using active networks technology for dynamic QoS. 1692-1709 - Gustavo B. Figueiredo, Nelson L. S. da Fonseca
, José Augusto Suruagy Monteiro
:
A minimum interference routing algorithm with reduced computational complexity. 1710-1732 - Hao Shang, Craig E. Wills:
Piggybacking related domain names to improve DNS performance. 1733-1748 - Albert Banchs, Luca Vollero:
Throughput analysis and optimal configuration of 802.11e EDCA. 1749-1768 - Serge A. Krashakov
, Anton B. Teslyuk, Lev N. Shchur:
On the universality of rank distributions of website popularity. 1769-1780 - Eunjin Jung, Alex X. Liu, Mohamed G. Gouda:
Key bundles and parcels: Secure communication in many groups. 1781-1798 - Eitan Altman, Rachid El Azouzi, David Ros, Bruno Tuffin:
Loss strategies for competing AIMD flows. 1799-1815 - Hyang-Won Lee, Song Chong:
A distributed utility max-min flow control algorithm. 1816-1830 - Florin Baboescu, Priyank Ramesh Warkhede, Subhash Suri, George Varghese:
Fast packet classification for two-dimensional conflict-free filters. 1831-1842 - Georgios Kambourakis
, Angelos N. Rouskas, Stefanos Gritzalis
, Dimitris Geneiatakis:
Support of subscribers' certificates in a hybrid WLAN-3G environment. 1843-1859 - Antonios Argyriou
, Vijay K. Madisetti:
A soft-handoff transport protocol for media flows in heterogeneous mobile networks. 1860-1871 - Hechmi Khlifi, Jean-Charles Grégoire:
Low-complexity offline and online clock skew estimation and removal. 1872-1884
Volume 50, Number 12, August 2006
- Jennifer C. Hou, P. R. Kumar:
Network modelling and simulation. 1885-1886 - Yijie Han, Richard J. La, Armand M. Makowski, Seungjoon Lee:
Distribution of path durations in mobile ad-hoc networks - Palm's Theorem to the rescue. 1887-1900 - Kyung-Joon Park
, Hyuk Lim
, Chong-Ho Choi:
Stochastic analysis of packet-pair probing for network bandwidth estimation. 1901-1915 - Xiaojun Hei
, Brahim Bensaou, Danny H. K. Tsang:
Model-based end-to-end available bandwidth inference using queueing analysis. 1916-1937 - Tuna Güven, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee:
Measurement-based optimal routing on overlay architectures for unicast sessions. 1938-1951 - Rachid El Abdouni Khayari:
Design and evaluation of web proxies by leveraging self-similarity of web traffic. 1952-1973 - Daniel R. Figueiredo
, Benyuan Liu, Yang Guo, James F. Kurose, Donald F. Towsley:
On the efficiency of fluid simulation of networks. 1974-1994 - Hwangnam Kim:
Integrating network-calculus-based simulation with packet-level simulation for TCP-operated networks. 1995-2012 - Xenofontas A. Dimitropoulos, George F. Riley:
Efficient large-scale BGP simulations. 2013-2027 - Yu Liu, Boleslaw K. Szymanski
, Adnan Saifee:
Genesis: A scalable distributed system for large-scale parallel network simulation. 2028-2053 - Li Lao, Jun-Hong Cui, Mario Gerla:
A framework for realistic and systematic multicast performance evaluation. 2054-2070 - Assen Golaup, Hamid Aghvami:
A multimedia traffic modeling framework